Dion CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Flashcards

1
Q
A

Wo/o/wg/b/wb/g/wbr/br t568B

wg/g/wo/b/wb/o/wbr/br t568A

You need to have the T-568-A and T-568-B standards memorized before test day because you may be asked to perform a drag and drop exercise of placing the right colored wires into the right numbered pins based on a T-568A or T-568B connector. Remember, a straight-through cable will have T-568B on both ends. If you are asked to make a cross-over cable, you need a T-568A on one side and a T-568B on the other side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to identify the switches connected to each port quickly?

A

By enabling a discovery protocol on the network devices, the technician will be able to get detailed information such as the IP addresses, system version, and device information from supporting devices directly connected to the discovery protocol, therefore providing information about the specific routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A college needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. What type of antenna will provide the BEST coverage?

A

High gain antennas put out increased signal strengths and can reach further with fewer WAPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An end-user receives a new computer and now is unable to connect to a database using ODBC. Other users can connect successfully, and the network technician can successfully ping the database server but still is unable to connect. What might have caused this issue?

A

A change in the firewall settings to allow access to the specified ports will fix the problem. It appears the default firewall on this new computer is blocking the port used to communicate with the database server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network’s design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?

A

SCADA/ICS is used in industrial control systems, such as an assembly-line network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A client has combined the voice-data circuit from a provider and gets a maximum download and upload speeds of 2.0Mbps. Which type of service is MOST likely being used by the client?

A

E1 service provides symmetric 2.0 Mbps of data service. It can handle voice and digital services (with a mix-n-match service). E1 is the European signal of DS1. E1 has higher bandwidth than T1 because of T1 reserves bits for overhead. VDSL and ADSL provide different upload and download rates, but this question shows symmetric upload and download rate was used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have installed and configured a new wireless router. The clients and hosts can ping each other. The WAN connection is 10Gbp/s. The wired clients have fast connections, but the wireless clients are slow to ping and browse the Internet. Which of the following is MOST likely the cause of the slow speeds experienced by the wireless clients?

A

If interference in the wireless spectrum occurs, more retransmissions will be needed (and thereby slowing speeds experienced). All the other answers will not cause a slow down of only the wireless network. And a high signal to noise ratio is a good thing on wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?

A

POTS is the Plain Old Telephone System and is connected to almost every facility in the United States. DSL and dial-up services can be received over POTS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which communication technology would MOST likely be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths?

A

Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly used in MANs (metropolitan area networks). DWDM uses as many as 32 light wavelengths on a single fiber, where each wavelength can support as many as 160 simultaneous connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement?

A

Since the back end uses a RADIUS server for back-end authentication, the network administrator can install 802.1x using EAP with MSCHAPv2 for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. What solution would be BEST to achieve this?

A

A Remote Authentication Dial-in User Service (RADIUS) server provides AAA management for users connecting to a wired or wireless network, which includes the ability to authenticate users. As servers are inherently not built with wireless access capabilities, an access point would have to be included in the setup for the RADIUS to work correctly with wireless clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your network security manager wants a monthly report of the security posture of all the assets on the network (e.g., workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, or other essential security feature and its risk severity. Which solution would work best to find this data?

A

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks, or applications for weaknesses. Most vulnerability scanners also create an itemized report of their findings after the scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Chief Information Officer (CIO) wants to improve the security of the company’s data. Which management control should be implemented to ensure employees are using encryption to transmit any sensitive information over the network?

A

OBJ-3.5: Policies are plans that describe the goal of an established procedure (Acceptable use, Physical Security, or VPN access), while the standards are the mechanisms implemented to achieve that goal. VPN and HTTPS are examples of standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly